[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Hassan et al., 2017 - Google Patents

Digital Privacy and Security Using Windows: A Practical Guide

Hassan et al., 2017

Document ID
6533827763793972344
Author
Hassan N
Hijazi R
Publication year

External Links

Snippet

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book …
Continue reading at books.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Similar Documents

Publication Publication Date Title
Alabdan Phishing attacks survey: Types, vectors, and technical approaches
Hassan et al. Open source intelligence methods and tools
Rathore et al. Social network security: Issues, challenges, threats, and solutions
Heartfield et al. A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
Fire et al. Online social networks: threats and solutions
Kremling et al. Cyberspace, cybersecurity, and cybercrime
Parsons et al. The predator in your pocket: A multidisciplinary assessment of the stalkerware application industry
Hassan et al. Digital Privacy and Security Using Windows: A Practical Guide
Pande Introduction to cyber security
Varshney et al. Anti-phishing: A comprehensive perspective
Wilner et al. On the social science of ransomware: Technology, security, and society
Jakobsson The death of the internet
Retzkin Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it
Broadhurst Cybercrime: Thieves, Swindlers, Bandits, and Privateers in Cyberspace
Ali et al. Dark World: A Book on the Deep Dark Web
Kissell Take control of your online privacy
Frumento et al. The role of Social Engineering in evolution of attacks
Speed et al. Mobile Security: How to secure, privatize and recover your devices
Imtiaz et al. Analysis of Cybersecurity Measures for Detection, Prevention, and Misbehaviour of Social Systems
Birthriya et al. A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies
Day Security in the Digital World: For the home user, parent, consumer and home office
Connolly User privacy: A practical guide for librarians
Hudaib Comprehensive social media security analysis & xkeyscore espionage technology
Roddel The Ultimate Guide to Internet Safety Second Edition
Donaldson et al. Understanding security issues